Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53767 (GCVE-0-2025-53767)
Vulnerability from cvelistv5 – Published: 2025-08-07 21:01 – Updated: 2026-02-26 17:49 Exclusively Hosted Service
VLAI?
EPSS
Title
Azure OpenAI Elevation of Privilege Vulnerability
Summary
Azure OpenAI Elevation of Privilege Vulnerability
Severity ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Azure Open AI |
Affected:
-
|
Date Public ?
2025-08-07 07:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53767",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-13T15:04:00.828666Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:49:49.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Azure Open AI",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "-"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*",
"versionStartIncluding": "-",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-08-07T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Azure OpenAI Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T18:54:59.045Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Azure OpenAI Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"tags": [
"exclusively-hosted-service"
],
"title": "Azure OpenAI Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-53767",
"datePublished": "2025-08-07T21:01:02.345Z",
"dateReserved": "2025-07-09T13:25:25.500Z",
"dateUpdated": "2026-02-26T17:49:49.050Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53767\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-08-07T21:15:28.007\",\"lastModified\":\"2025-08-14T17:32:03.190\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[{\"sourceIdentifier\":\"secure@microsoft.com\",\"tags\":[\"exclusively-hosted-service\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Azure OpenAI Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de elevaci\u00f3n de privilegios de Azure OpenAI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_openai:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1EE6399-239E-479B-A473-B37ECEB110E7\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53767\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-08T16:43:48.262381Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-08T16:46:37.905Z\"}}], \"cna\": {\"tags\": [\"exclusively-hosted-service\"], \"title\": \"Azure OpenAI Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 10, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Open AI\", \"versions\": [{\"status\": \"affected\", \"version\": \"-\"}]}], \"datePublic\": \"2025-08-07T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767\", \"name\": \"Azure OpenAI Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Azure OpenAI Elevation of Privilege Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"-\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-13T18:54:59.045Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53767\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-13T18:54:59.045Z\", \"dateReserved\": \"2025-07-09T13:25:25.500Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-08-07T21:01:02.345Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-53767
Vulnerability from fkie_nvd - Published: 2025-08-07 21:15 - Updated: 2025-08-14 17:32
Severity ?
Summary
Azure OpenAI Elevation of Privilege Vulnerability
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_openai | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_openai:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1EE6399-239E-479B-A473-B37ECEB110E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Azure OpenAI Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Azure OpenAI"
}
],
"id": "CVE-2025-53767",
"lastModified": "2025-08-14T17:32:03.190",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.8,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2025-08-07T21:15:28.007",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
GHSA-6VJ9-H2J2-WMPR
Vulnerability from github – Published: 2025-08-07 21:31 – Updated: 2025-08-07 21:31
VLAI?
Details
Azure OpenAI Elevation of Privilege Vulnerability
Severity ?
10.0 (Critical)
{
"affected": [],
"aliases": [
"CVE-2025-53767"
],
"database_specific": {
"cwe_ids": [
"CWE-918"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-07T21:15:28Z",
"severity": "CRITICAL"
},
"details": "Azure OpenAI Elevation of Privilege Vulnerability",
"id": "GHSA-6vj9-h2j2-wmpr",
"modified": "2025-08-07T21:31:08Z",
"published": "2025-08-07T21:31:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53767"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1780
Vulnerability from csaf_certbund - Published: 2025-08-12 22:00 - Updated: 2025-08-12 22:00Summary
Microsoft Azure: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Azure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack können die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.
Azure ist eine Cloud Computing-Plattform von Microsoft.
Angriff: Ein Angreifer kann mehrere Schwachstellen in verschiedenen Komponenten von Microsoft Azure Stack und Microsoft Azure ausnutzen, um seine Privilegien zu erhöhen, und um Informationen offenzulegen.
Betroffene Betriebssysteme: - Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Azure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack k\u00f6nnen die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.\r\nAzure ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in verschiedenen Komponenten von Microsoft Azure Stack und Microsoft Azure ausnutzen, um seine Privilegien zu erh\u00f6hen, und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1780 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1780.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1780 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1780"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-12T22:00:00.000+00:00",
"generator": {
"date": "2025-08-13T07:42:11.094+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1780",
"initial_release_date": "2025-08-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Open AI",
"product": {
"name": "Microsoft Azure Open AI",
"product_id": "T046012",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version",
"name": "File Sync v18.0",
"product": {
"name": "Microsoft Azure File Sync v18.0",
"product_id": "T046013",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v18.0"
}
}
},
{
"category": "product_version",
"name": "File Sync v19.0",
"product": {
"name": "Microsoft Azure File Sync v19.0",
"product_id": "T046014",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v19.0"
}
}
},
{
"category": "product_version",
"name": "File Sync v20.0",
"product": {
"name": "Microsoft Azure File Sync v20.0",
"product_id": "T046015",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v20.0"
}
}
},
{
"category": "product_version",
"name": "DCasv5-series VM",
"product": {
"name": "Microsoft Azure DCasv5-series VM",
"product_id": "T046016",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcasv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "DCadsv5-series VM",
"product": {
"name": "Microsoft Azure DCadsv5-series VM",
"product_id": "T046017",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcadsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECasv5-series VM",
"product": {
"name": "Microsoft Azure ECasv5-series VM",
"product_id": "T046019",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecasv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECadsv5-series VM",
"product": {
"name": "Microsoft Azure ECadsv5-series VM",
"product_id": "T046020",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecadsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "DCesv5-series-VM",
"product": {
"name": "Microsoft Azure DCesv5-series-VM",
"product_id": "T046021",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcesv5-series_-_vm"
}
}
},
{
"category": "product_version",
"name": "DCedsv5-series VM",
"product": {
"name": "Microsoft Azure DCedsv5-series VM",
"product_id": "T046022",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcedsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECesv5-series VM",
"product": {
"name": "Microsoft Azure ECesv5-series VM",
"product_id": "T046023",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecesv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "ECedsv5-series VM",
"product": {
"name": "Microsoft Azure ECedsv5-series VM",
"product_id": "T046024",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecedsv5-series_vm"
}
}
},
{
"category": "product_version",
"name": "NCCadsH100v5-series VM",
"product": {
"name": "Microsoft Azure NCCadsH100v5-series VM",
"product_id": "T046025",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:nccadsh100v5-series_vm"
}
}
},
{
"category": "product_version",
"name": "File Sync v21.0",
"product": {
"name": "Microsoft Azure File Sync v21.0",
"product_id": "T046026",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:file_sync_v21.0"
}
}
},
{
"category": "product_version",
"name": "Portal",
"product": {
"name": "Microsoft Azure Portal",
"product_id": "T046027",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
},
{
"category": "product_version",
"name": "DCesv6-series VM",
"product": {
"name": "Microsoft Azure DCesv6-series VM",
"product_id": "T046031",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:dcesv6-series_vm"
}
}
},
{
"category": "product_version",
"name": "Ecesv6-series VM",
"product": {
"name": "Microsoft Azure Ecesv6-series VM",
"product_id": "T046032",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:ecesv6-series_vm"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version",
"name": "Hub",
"product": {
"name": "Microsoft Azure Stack Hub",
"product_id": "T037430",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub"
}
}
},
{
"category": "product_version",
"name": "Hub 2501",
"product": {
"name": "Microsoft Azure Stack Hub 2501",
"product_id": "T046028",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2501"
}
}
},
{
"category": "product_version",
"name": "Hub 2408",
"product": {
"name": "Microsoft Azure Stack Hub 2408",
"product_id": "T046029",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2408"
}
}
},
{
"category": "product_version",
"name": "Hub 2406",
"product": {
"name": "Microsoft Azure Stack Hub 2406",
"product_id": "T046030",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hub_2406"
}
}
}
],
"category": "product_name",
"name": "Azure Stack"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"product_status": {
"known_affected": [
"T046030",
"T037430",
"T046019",
"T046017",
"T046028",
"T046029",
"T046022",
"T046012",
"T046023",
"T046020",
"T046031",
"T046021",
"T046032",
"T046015",
"T046026",
"T046016",
"T046027",
"T046013",
"T046024",
"T046014",
"T046025"
]
},
"release_date": "2025-08-12T22:00:00.000+00:00",
"title": "CVE-2025-53793"
}
]
}
WID-SEC-W-2025-1745
Vulnerability from csaf_certbund - Published: 2025-08-07 22:00 - Updated: 2025-08-10 22:00Summary
Microsoft Azure: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Azure ist eine Cloud Computing-Plattform von Microsoft.
Angriff: Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Azure ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme: - Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Azure ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Microsoft Azure ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1745 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1745.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1745 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1745"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation",
"tracking": {
"current_release_date": "2025-08-10T22:00:00.000+00:00",
"generator": {
"date": "2025-08-11T07:52:50.830+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1745",
"initial_release_date": "2025-08-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-23958, EUVD-2025-23957"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Open AI",
"product": {
"name": "Microsoft Azure Open AI",
"product_id": "T045948",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version",
"name": "Portal",
"product": {
"name": "Microsoft Azure Portal",
"product_id": "T045949",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53767",
"product_status": {
"known_affected": [
"T045949",
"T045948"
]
},
"release_date": "2025-08-07T22:00:00.000+00:00",
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53792",
"product_status": {
"known_affected": [
"T045949",
"T045948"
]
},
"release_date": "2025-08-07T22:00:00.000+00:00",
"title": "CVE-2025-53792"
}
]
}
MSRC_CVE-2025-53767
Vulnerability from csaf_microsoft - Published: 2025-08-12 07:00 - Updated: 2025-08-07 07:00Summary
Azure OpenAI Elevation of Privilege Vulnerability
Severity
Critical
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Not required. The vulnerability documented by this CVE requires no customer action to resolve.
10.0 (Critical)
References
Acknowledgments
<a href="https://www.linkedin.com/in/danielberredo/">Daniel Santos</a> with Microsoft
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://www.linkedin.com/in/danielberredo/\"\u003eDaniel Santos\u003c/a\u003e with Microsoft"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Not required. The vulnerability documented by this CVE requires no customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53767.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Azure OpenAI Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2025-08-07T07:00:00.000Z",
"generator": {
"date": "2025-11-10T00:11:43.023Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53767",
"initial_release_date": "2025-08-12T07:00:00.000Z",
"revision_history": [
{
"date": "2025-08-07T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"category": "product_name",
"name": "Azure Open AI",
"product": {
"name": "Azure Open AI",
"product_id": "12286"
}
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.\nPlease see Toward greater transparency: Unveiling Cloud Service CVEs for more information.",
"title": "Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?"
}
],
"product_status": {
"fixed": [
"12286"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"category": "self",
"summary": "CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "CHANGED",
"temporalScore": 8.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"12286"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No"
}
],
"title": "Azure OpenAI Elevation of Privilege Vulnerability"
}
]
}
NCSC-2025-0249
Vulnerability from csaf_ncscnl - Published: 2025-08-13 07:22 - Updated: 2025-08-13 07:22Summary
Kwetsbaarheden verholpen in Azure-producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Microsoft heeft kwetsbaarheden verholpen in Azure-producten.
Interpretaties: De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.
```
Azure Stack:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens |
| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Azure OpenAI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Portal:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Azure Virtual Machines:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens |
| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Azure File Sync:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
```
Oplossingen: Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
CWE-284: Improper Access Control
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE-287: Improper Authentication
CWE-284
- Improper Access Control
CWE-284
- Improper Access Control
CWE-359
- Exposure of Private Personal Information to an Unauthorized Actor
10.0 (Critical)
CWE-200
- Exposure of Sensitive Information to an Unauthorized Actor
9.1 (Critical)
CWE-22
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Azure-producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.\n```\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens | \n| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nAzure OpenAI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Portal: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Virtual Machines: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nAzure File Sync: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
}
],
"title": "Kwetsbaarheden verholpen in Azure-producten",
"tracking": {
"current_release_date": "2025-08-13T07:22:17.432067Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0249",
"initial_release_date": "2025-08-13T07:22:17.432067Z",
"revision_history": [
{
"date": "2025-08-13T07:22:17.432067Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/open ai",
"product": {
"name": "vers:unknown/open ai",
"product_id": "CSAFPID-3039718",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/portal",
"product": {
"name": "vers:unknown/portal",
"product_id": "CSAFPID-3039717",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049136"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3049230"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049229"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3048954"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product": {
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product_id": "CSAFPID-3048951"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product": {
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product_id": "CSAFPID-3048952"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product": {
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product_id": "CSAFPID-3048953"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/1.2406.1.23",
"product": {
"name": "vers:microsoft/1.2406.1.23",
"product_id": "CSAFPID-3049184"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2408.1.50",
"product": {
"name": "vers:microsoft/1.2408.1.50",
"product_id": "CSAFPID-3049183"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2501.1.47",
"product": {
"name": "vers:microsoft/1.2501.1.47",
"product_id": "CSAFPID-3049182"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/102.10.2.11",
"product": {
"name": "vers:microsoft/102.10.2.11",
"product_id": "CSAFPID-3049090"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3049089"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "product_family",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3048852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub_2406:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub 2406"
}
],
"category": "product_family",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038148"
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038150"
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3048737"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53729.json"
}
],
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53765.json"
}
],
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53781 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53781.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53793 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53793.json"
}
],
"title": "CVE-2025-53793"
}
]
}
BDU:2025-09637
Vulnerability from fstec - Published: 07.08.2025
VLAI Severity ?
Title
Уязвимость облачной платформы Azure OpenAI, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость облачной платформы Azure OpenAI связана с недостаточной проверкой поступающих запросов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, повысить свои привилегии
Severity ?
Vendor
Microsoft Corp
Software Name
Azure Open AI
Software Version
- (Azure Open AI)
Possible Mitigations
Установка обновлений из доверенных источников. В связи со сложившейся обстановкой и введенными санкциями против Российской Федерации рекомендуется устанавливать обновления программного обеспечения только после оценки всех сопутствующих рисков.
Компенсирующие меры:
- использование средств межсетевого экранирования для ограничения удалённого доступа к уязвимому программному обеспечению;
- ограничение доступа к уязвимому программному обеспечению, используя схему доступа по «белым спискам»;
- использование систем обнаружения и предотвращения вторжений для обнаружения (выявления, регистрации) и реагирования на попытки эксплуатации уязвимости;
- использование виртуальных частных сетей для организации удаленного доступа (VPN).
Использование рекомендаций:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767
CWE
CWE-918
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Azure Open AI)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0441\u0445\u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e \u00ab\u0431\u0435\u043b\u044b\u043c \u0441\u043f\u0438\u0441\u043a\u0430\u043c\u00bb;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "13.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09637",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53767",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Azure Open AI",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Azure OpenAI, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043f\u043e\u0441\u0442\u0443\u043f\u0430\u044e\u0449\u0438\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0421\u0435\u0440\u0432\u0435\u0440\u043d\u0430\u044f \u0444\u0430\u043b\u044c\u0441\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 (CWE-918)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Azure OpenAI \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u043f\u043e\u0441\u0442\u0443\u043f\u0430\u044e\u0449\u0438\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041f\u043e\u0434\u043c\u0435\u043d\u0430 \u043f\u0440\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-918",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,4)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}
CERTFR-2025-AVI-0666
Vulnerability from certfr_avis - Published: 2025-08-08 - Updated: 2025-08-08
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneReferences
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Portal",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Open AI",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53767"
},
{
"name": "CVE-2025-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53792"
}
],
"initial_release_date": "2025-08-08T00:00:00",
"last_revision_date": "2025-08-08T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0666",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53767",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53792",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…